πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ DHS Urges 'Highest Priority' Attention on Old Chinese Malware Threat πŸ•΄

"Taidoor" is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FBI Warns on New E-Commerce Fraud πŸ•΄

A wave of new, fraudulent websites has popped up to take advantage of the rise in online shopping during the coronavirus pandemic.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to make your PC passwordless in the Windows 10 May 2020 Update πŸ”

You don't need an account password to sign into Windows 10 version 2004.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-11584

A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11583

A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 11 Hot Startups to Watch at Black Hat USA πŸ•΄

A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 11 Hot Startups to Watch at Black Hat USA πŸ•΄

A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.

πŸ“– Read

via "Dark Reading: ".
πŸ” VMware Carbon Black Threat Report finds hackers using more aggressive and destructive tactics πŸ”

Security firm recommends digital distancing for devices and more collaboration between IT and security teams to harden the attack surface.

πŸ“– Read

via "Security on TechRepublic".
⚠ GandCrab ransomware hacker arrested in Belarus ⚠

Suspect is alleged to have extorted more than 1000 people, mostly in India, US, Ukraine, UK, Germany, France, Italy and Russia.

πŸ“– Read

via "Naked Security".
❌ Podcast: Learning to β€˜Speak the Language’ of OT Security Teams ❌

Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, talks about the differing priorities between IT and OT security teams as industrial control systems become connected.

πŸ“– Read

via "Threatpost".
❌ Apple Knocked Off Perch as Most Imitated Brand for Phishing Attacks ❌

COVID-19 pandemic spurs spoofing preference changes, plus a surge in email-based attacks.

πŸ“– Read

via "Threatpost".
πŸ” How poor security practices from remote employees are wasting the time of IT staff πŸ”

Along with the independence remote work affords employees comes the use of shadow IT and poor password practices, according to a new survey by 1Password.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Study finds misconfigured cloud storage services in 93% of cloud deployments analyzed πŸ”

An Accurics study said cloud breaches will likely increase in velocity and scale as more enterprises move to the cloud.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Securing IoT as a Remote Workforce Strategy πŸ•΄

Digital transformation with Internet of Things devices offers organizations a way forward in the era of COVID-19. Optimizing this approach for the future will need to start with security.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-20001

An issue was discovered in RICOH Streamline NX Client Tool and RICOH Streamline NX PC Client that allows attackers to escalate local privileges.

πŸ“– Read

via "National Vulnerability Database".
❌ Twitter Could Face $250M FTC Fine Over Improper Data Use ❌

The potential FTC fine comes after Twitter last year acknowledged that user emails and phone numbers were being used for targeted advertising.

πŸ“– Read

via "Threatpost".
πŸ›  Sifter 9.2 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.8 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Google & Amazon Replace Apple as Phishers' Favorite Brands πŸ•΄

Google and Amazon were the most imitated brands in the second quarter, knocking out Apple.

πŸ“– Read

via "Dark Reading: ".